1 M.J. Schniederjans, "Using the Analytic Hierarchy Process and Goal Programming for Information System Project Selection" 20 (20): 333-342, 1991
2 T. Tsiakis, "The Economic Approach of Information Security" 24 (24): 105-108, 2005
3 R.Hefner,, "System Security Engineering Capability Maturity Model" 1997
4 M. Patel, "System Design through Subsystem Selection Using Physical Programming" 41 (41): 1089-1096, 1089
5 L. Chan, "Quality Function Deployment: a Literature Review" 143 (143): 463-497, 2002
6 S. Chakraborty, "QFD-Based Expert System for Non-Traditional Machining Processes Selection" 32 (32): 1208-1217, 2007
7 H. Tanaka, "Possibilistic Linear Systems and Their Application to the Linear Regression Model" 27 (27): 275-289, 1988
8 M. Choi, "Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System" Springer 4867 : 359-370, 2008
9 P. Kongsuwan, "Managing Quality Level for Developing Information Security System Adopting QFD," 19-24, 2008
10 H. Tanaka, "Linear Regression Analysis with Fuzzy Model" 12 (12): 903-907, 1982
1 M.J. Schniederjans, "Using the Analytic Hierarchy Process and Goal Programming for Information System Project Selection" 20 (20): 333-342, 1991
2 T. Tsiakis, "The Economic Approach of Information Security" 24 (24): 105-108, 2005
3 R.Hefner,, "System Security Engineering Capability Maturity Model" 1997
4 M. Patel, "System Design through Subsystem Selection Using Physical Programming" 41 (41): 1089-1096, 1089
5 L. Chan, "Quality Function Deployment: a Literature Review" 143 (143): 463-497, 2002
6 S. Chakraborty, "QFD-Based Expert System for Non-Traditional Machining Processes Selection" 32 (32): 1208-1217, 2007
7 H. Tanaka, "Possibilistic Linear Systems and Their Application to the Linear Regression Model" 27 (27): 275-289, 1988
8 M. Choi, "Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System" Springer 4867 : 359-370, 2008
9 P. Kongsuwan, "Managing Quality Level for Developing Information Security System Adopting QFD," 19-24, 2008
10 H. Tanaka, "Linear Regression Analysis with Fuzzy Model" 12 (12): 903-907, 1982
11 A. Messac, "Linear Physical Programming: a New Approach to Multiple Objective Optimization" 8 (8): 39-59, 1996
12 M.J.Schniederjans, "Linear Goal Programming" Petrocelli Books 1984
13 C.S. Leem, "Introduction to an Integrated Methodology for Development and Implementation of Enterprise Information Systems" 60 (60): 349-361, 2002
14 EC advisory group SOG-IS,, "Information Technology Security Evaluation Criteria (ITSEC)"
15 M. Monheit, "Information Systems Architecture: a Consulting Methodology" 568-572, 1990
16 M. Eloff, "Information Security Management, Hierarchical Framework for Various Approaches" 19 (19): 243-256, 2000
17 "ISO/IEC 9126-1:2001"
18 "ISO/IEC 15408-1:2005"
19 W.T.Polk, "Guide to the Selection of Anti-Virus Tools & Techniques" ,Diane Books PublishingCompany 1992
20 W. Chen, "Exploration of the Effectiveness of Physical Programming in Robust Design" 122 (122): 155-163, 2000
21 E.E. Anderson, "Enterprise Information Security Strategies" 27 (27): 22-29, 2008
22 E. Kongar, "Disassembly-to-Order System Using Linear Physical Programming" 312-317, 2002
23 Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation Criteria"
24 E. Melachrinoudis, "Consolidating a Warehouse Network: a Physical Programming Approach" 97 (97): 1-17, 2005
25 H.V.Nguyen, "An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming" 2009
26 E. Eetugrul Karsak, "An Integrated Decision Making Approach for ERP System Selection," 36 (36): 660-667, 2009
27 R. Firth, "An Approach for Selecting and Specifying Tools for Information Survivability" Carnegie Mellon University 1998
28 S. Kim, "A Study on Decision Consolidation Methods Using Analytic Models for Security Systems" 26 (26): 145-153, 2007
29 T.L. Saaty, "A Scaling Method for Priorities in Hierarchical Structures" 15 (15): 234-281, 1977
30 H.Y. Lin, "A Fuzzy-Based Decision-Making Procedure for Data Warehouse System Selection" 32 (32): 939-953, 2007